Security Management in Cyber Domain (5 cr)
Code: YTCP0100-3004
General information
Enrollment
01.08.2022 - 04.09.2022
Timing
29.08.2022 - 16.12.2022
Number of ECTS credits allocated
5 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- English
Seats
0 - 35
Degree programmes
- Master's Degree Programme in Information Technology, Cyber Security
Teachers
- Jari Hautamäki
Objectives
The student understands terminology and principles of cyber security and he (she) knows most of important models used in cyber security management.
Course competences
EUR-ACE: Knowledge and Understanding, Master's Degree
EUR-ACE: Engineering Analysis, Master's Degree
EUR-ACE: Lifelong Learning, Master's Degree
Content
The key topics of the course are:
- Terminology in cyber domain (of Cyber security)
- Threat actors / vectors
- Cybersecurity strategy
- Security management
- Continuous Security Improvement
- Risk management
- Continuity management
- Security management models
- Information Security Management Processes and Phases
- Legislation
Time and location
Contact lessons:
9/21 , 10/21, 11/21 and 12/21
Location:
Piippukatu 2, Jyväskylä
Room:
D504 (Koivuluokka)
Learning materials and recommended literature
Cyber Security Management: A Governance, Risk and Compliance Framework
* Peter Trim and Yang-Im Lee
* Gower Publishing Limited © 2014 (263 pages)
* ISBN:9781472432094
* By simplifying complex material, this book provides a multi-disciplinary perspective, and an explanation and interpretation of how managers can manage cyber threats in a proactive manner and work towards counteracting cyber threats both now and in the future.
Cyber Security : analytics, technology and automation
* Electronic publication
* Lehto, Martti, toimittaja. ; Neittaanmäki, Pekka, toimittaja.
* Springer 2015.
* Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers.
Practical Information Security Management: A Complete Guide to Planning and Implementation
* Books24x7
* https://janet.finna.fi/Record/nelli27_jamk.3710000000965191
Teaching methods
Contact lessons one time per month (Friday-Saturday)
Remote studies
* Home assignments
CSM exercise
* Seminar
Student workload
Workload per students 135 hour
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student demonstrates sufficient mastery of the theory on management of cyber security and is able to analyse existing state of enterprises cyber security. The student have sufficient understand of enterprises threats and risks that are formulated related to context. The student is able to design cyber security management system based on given requirement definition. The student reflects on his (her) own learning sufficiently.
Satisfactory 2: The student demonstrates satisfactory mastery of the theory on management of cyber security and is able to analyse existing state of enterprises cyber security. The student have satisfactory understand of enterprises threats and risks that are formulated related to context. The student is able to design a satisfactory cyber security management system based on given requirement definition. The student reflects on his (her) own learning satisfactorily.
Evaluation criteria, good (3-4)
Good 3: The student demonstrates good mastery of the theory on management of cyber security and is able to analyze existing state of enterprises cyber security. The student has good understand of enterprises threats and risks that are formulated related to context. The student is able to design a good cyber security management system based on given requirement definition. The student reflects on his (her) own learning well.
Very good 4: The student demonstrates very good mastery of the theory on management of cyber security and is able to analyze existing state of enterprises cyber security. The student has very good understand of enterprises threats and risks that are formulated related to context. The student is able to design a very good cyber security management system based on given requirement definition. The student reflects on his (her) own learning very well.
Evaluation criteria, excellent (5)
Excellent 5: The student demonstrates excellent mastery of the theory on management of cyber security and is able to analyse existing state of enterprises cyber security in a versatile manner. The student understands excellently enterprises threats and risks that are formulated related to context. The student is able to design an excellent cyber security management system based on given requirement definition. The student reflects on his (her) own learning commendably.
Prerequisites
-